to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch industry professionals. We are searching for talented individuals who provide intelligence, engineering, and mission management expertise for the Government. This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to … Data Collection. Plan program and event level testing for collection of data required for analysis and to synch T&E events with supported decision points. Establish and employ Data & ConfigurationManagement capabilities. Support Data Authentication group functions; and comply with program Discrepancy Reporting criteria and processes. Assess operational and system performance requirements for testability and criticality to frame … and Test Readiness Reports). Design data sampling schemes to optimize the information/resource balance and to control testing uncertainties. Select, coordinate. and calibrate Instrumentation, collection and data management tools, targets, and facilities. Ensure test readiness including training of test event participants re conduct of the event; equipment readiness, and security legal, and privacy compliance arrangements. Participate in More ❯
standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified … information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configurationmanagement (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements … Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements TS/SCI w/Polygraph Clearance Required Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or related discipline and 12 or more years of related experience, in lieu of More ❯
specifications and customer requirements, directing/overseeing activities associated with maintaining all company certifications, and all external agency approvals such as AS9100D certification, ASME certification, NADCAP and NUPIC. overseeing configurationmanagement, and quality assurance processes. Functional accountability for the operation of quality Management System and Quality Assurance processes, both in the office and factory Work closely with More ❯
Data Collection. Plan program and event level testing for collection of data required for analysis and to synch T&E events with supported decision points. Establish and employ Data & ConfigurationManagement capabilities. Support Data Authentication group functions; and comply with program Discrepancy Reporting criteria and processes. Assess operational and system performance requirements for testability and criticality to frame … Procedures and Test Readiness Reports) Design data sampling schemes to optimize the information/resource balance and to control testing uncertainties. Select, coordinate, and calibrate Instrumentation, collection and data management tools, targets, & facilities Ensure test readiness including training of test event participants re conduct of the event; equipment readiness, and security, legal, and privacy compliance arrangements (U) Participate in … and/or Integrated Test Team for coordination of data collection plans. Execute Testing and Data Collection per plan. Produce associated Test Plans, Procedures, and Reports/Briefings, Data Management Plan Define and provide technical direction and guidance for the Level 1 tasks to the Level O and Level 1 TEs assigned to the task. Recommend draft plans and More ❯
infrastructure (fiber and copper-based). Analyze network performance metrics (e.g., traffic load, connection time, transmission speeds, packet sizes, throughput). Conduct site surveys, develop network designs, and manage configuration control and testing activities. Implement updates and security patches (STIG compliance) as directed by the communications squadron. Support Installation, Operations, and Maintenance (IO&M) for VoSIP systems and endpoint … devices. Provide hands-on training to military personnel on network and configurationmanagement to ensure continuity during emergencies, contractor absences, or lockout scenarios. Maintain an accurate inventory of VoSIP end devices (IP phones, switches, servers). Manage Backup and Restore Services (BARS) on Call Manager Publishers, ensuring regular automated backups to designated network storage or removable media. Perform … 6+ years of network experience that includes network design, architecture, development, and remote and local monitoring and analysis of C4 automated systems. In-depth knowledge of remote monitoring and configuration of network equipment, TCP/IP addressing, experience with Asynchronous Transport Mode (ATM), GIG Ethernet, TACLANEs and TACLANE management, CISCO Products (Cisco Catalyst switches, Cisco Identity Services Engine More ❯
Senior DevSecOps Lead Software Engineer Location: St. Louis, MO Clearance: Active Secret Required A Top Aerospace & Defense Company is seeking a Senior-Level DevSecOps Lead Software Engineer to join our Model-Based Software Team. In this role, you'll drive More ❯
decisions with business objectives. Accountabilities Lead engineering team seffectively, fostering a collaborative and high-performance culture to achieve project goals and meet organizational objectives. Oversee timelines, team allocation, risk management and task prioritization to ensure the successful delivery of solutions within scope, time, and budget. Mentor and support team members' professional growth, conduct performance reviews, provide actionable feedback, and … Specialist understanding of Layer 1-4 protocols and transport technologies. Experience with virtual infrastructure ecosystems across cloud platforms and open networking technologies. Proficiency in network programming/automation, IaC, configurationmanagement tools, and CI/CD pipelines. Additional Valued Skills Experience in network and infrastructure operational product engineering. Understanding of application layer network protocols and network access control. … Skilled in life cycle management of network products and services. Proficiency in Agile methodologies and SRE-specific reporting. Candidates may be assessed on critical skills such as risk and controls, change and transformation, business acumen, strategic thinking, and technical expertise. Job Title: Engineering Manager Location: Knutsford, UK Rate/Salary: .00 GBP Yearly Job Type: Permanent Trading as TEKsystems. More ❯
software development/coding experience At a minimum three (3) years of experience with web development with .NET, MVC, C#, HTML, CSS, JavaScript, and SQL Understand and use change management functions for production turnover Possesses skills to organize and implement operational level configurationmanagement TS/SCI clearance More ❯
program development, deployment, and training initiatives with the goal of leveraging significant program investments in IPDE and ICE across the Program. Selectee will be responsible for the development and management of requirements, as well as verification and validation efforts of product capabilities against those requirements. Interface with NAVSEA IPDE users and stakeholders to collect and aggregate user feedback to … facilitate issue resolution and recommend enhancements to improve IPDE usability. Familiarity with Siemens Teamcenter/NX, Advanced Technical Information Support (ATIS), Technical Document Management Information System (TDMIS), ship hull, mechanical and electrical drawings, drawing and nonconformance documentation processes (Technical Variance Documentation) and product configurationmanagement systems is preferred. Flexibility and Willingness to Perform Other Duties as Assigned. … robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which More ❯
and ensures interoperability and compliance with DoD and Air Force policies. Operating with a high degree of autonomy, the engineer/architect manages system architecture planning, lifecycle upgrades, and configuration control, while coordinating with leadership, cross-functional IT teams, and external partners. A strong focus on IT security, system accreditation, and mission readiness is essential to supporting AF TENCAP … unclassified, secret, and TS/SCI environments. Develop technical solutions for Communication System Requirement Documents (CSRDs), ensuring compliance with AF and DoD standards. Oversee systems integration, lifecycle planning, and configurationmanagement to maintain mission readiness and scalability. Conduct engineering assessments to identify performance shortfalls, recommend solutions, and optimize existing architectures. Manage the development and maintenance of technical drawings … CSIRs). Coordinate with internal teams, leadership, and external agencies to integrate new capabilities and ensure interoperability. Support accreditation activities by ensuring system designs meet all cybersecurity and risk management framework (RMF) requirements. Advise leadership on emerging technologies, architecture enhancements, and cost-effective integration strategies. Facilitate system upgrades, ensuring minimal operational impact while meeting mission timelines and budget constraints. More ❯
The SE develops technical documentation. The SE develops system architecture and system design documentation. The SE guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. The SE interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. The SE ultimate responsibility … Engineering area of responsibility. The SE communicates with other program personnel, government overseers, and senior executives. The Level 2 SE shall possess the following capabilities: Analysis and tracking and configurationmanagement experience Contributes to the development of sections of systems engineering documentation such as System Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Document Manages system … Assists with the development of system requirements, functional requirements, and allocation of the same to individual hardware, software, facility, and personnel components Coordinates the resolution of action items from Configuration Control Board (CCB) meetings, design reviews, program reviews, and test reviews that require cross-discipline coordination Participates in an Integrated Product Team to design new capabilities based upon evaluation More ❯
Owned Company based in Chantilly, VA. As an SDVOSB, the Red Gate Group has established a reputation for delivering quality multi-tiered services in intelligence analysis, strategic planning, program management, policy development, operational design, and technology integration. RGG delivers high-quality, customer-centric solutions around the world-from the foxhole to the highest levels of Government. Our motto, "Making … Technical Lifecycle Acquisition Support Specialist to provide expertise to the National Geospatial-Intelligence Agency (NGA) in Springfield, VA. This role requires a strong blend of acquisition support, technical program management, and subject matter expertise in GEOINT systems and intelligence community (IC) standards. The ideal candidate will be a trusted advisor who can assess, recommend, and guide acquisition strategies that … for Change (RFCs), ensuring coordination across stakeholders, integration of document changes, and contract alignment. Perform technical reviews of RFCs, participate in concept development, and contribute to engineering review and configurationmanagement boards. Apply NGA and IC enterprise data and technical standards to programs, ensuring consistency with community architectural concepts and acquisition goals. Advise program and project managers during More ❯
Expleo is a trusted partner for end-to-end, integrated engineering, quality services and management consulting for digital transformation. We help businesses harness unrelenting technological change to successfully deliver innovations that will help them gain a competitive advantage and improve the everyday lives of people around the globe. We are looking for Automotive Software Validation Engineers to drive forward … environments such as SIL, MIL and HIL test rigs. * Code Quality Reviews * Static Analysis of Code * Test Coverage Analysis * Production of Technical Documentation * Software Integration - Production of Builds and ConfigurationManagement in a DevOps environment. Qualifications * Engineering Degree in applicable discipline. Essential * Experience of Validation or Test within an Automotive Project Environment. * Experience of Developing Test Plans, Strategies … CD development environment. * BSW and BMS Software Experience Desired * Cloud Based Operations * Managing Test Metrics, such as runtime, CPU load, memory statistics. * Knowledge of Infineon & ADI in a battery management automotive context * Vector Stack Experience * ASIL D Safety Standard Experience * Knowledge of microprocessor safety, alarms, fault injection and handling, with Infineon TC3xx specific know-how. ** PLEASE NOTE ** To meet More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
networks, and database products Support a wide range of network facilities to include physical media, protocol stacks, hubs, routers, bridges, gateways, digital servers, line drivers, telecommunications components, and network management components Conduct risk assessment and provide recommendations for application design Troubleshoot a range of security issues including architecture, firewalls, electronic data traffic, and network access Analyze systems for malware … technologies, and information technology security research Convert customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints Establish, document, and maintain system baselines and configurationmanagement items Integrate new architectural features into existing infrastructures; design cyber security architectural artifacts; provide architectural analysis and relate existing system to future needs and trends; embed advanced More ❯
responsibilities will include maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed; assist with the management of security aspects of the information system and performs day-to-day security operations of the system; and evaluate security solutions to ensure they meet security requirements for processing … standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified … information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configurationmanagement (CM) for information system security software, hardware, and firmware. Manage changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements More ❯
Day-to-Day Operations of NAVAIR Depot Maintenance System (NDMS), SingleSite, OneNDMS, Data Convergence, Corporate Reporting System (CRS) and Other Initiatives. Support development, standardization, testing, and quality assurance and configurationmanagement procedures. Support standardization and maintenance of data dictionary, data structures and data repositories. Specific Tasks: Data modeling/architect: o Model in Kimball's dimensional methodology using … Security+ (may be obtained) and Certified Business Intelligence Professional Data modeling (Kimball's or similar methodology preferred). Bachelor's degree or postgraduate degree in computer science, information systems management, mathematics, operations research, statistics, or engineering or 8 eight years of combined education (at the undergraduate level in any academic field) and experience performing the foregoing functions. Employment Type More ❯
CONOPS, OIs, and other operating policies. Develop, validate, and approve OA procedures, reports, worksheets, and job aids. Serve as the primary interface for audits, reviews, and operational evaluations. Manage configuration control, document repository updates, and technical baselines (PWS 3.2.7). Lead development and delivery of OA training programs, materials, and certifications as outlined in PWS 3.2.3, 3.2.6, and Appendix … to develop, deliver, and revise formal training content for technical audiences. Experience guiding teams in anomaly resolution, mission planning, and high-stakes decision-making. SKILLS/ABILITIES Knowledge of configurationmanagement principles as applied to OA product development, documentation, and baseline control. Working knowledge of Milstar and AEHF satellite systems required. Expert knowledge in orbital dynamics, maneuver planning More ❯
be proud to be a part of. POSITION SUMMARY The Orbital Analyst (OA) supporting the Protected Band operations of the OAS III program is responsible for the real-time management of operational satellite communications (SATCOM) systems, mitigating risks, and ensuring mission success under time-sensitive conditions. This role supports protected band communications within the AEHF, and Milstar constellations and … SATCOM operations. Excellent communication and documentation skills. Working knowledge of AEHF and Milstar satellite systems is required. Familiarity with orbital mechanics, coordinating systems, and space environment effects. Knowledge of configurationmanagement principles. Effective written and verbal communication and coordination with internal teams and government stakeholders. Ability to contribute to training program development, maintenance of certification records, and job More ❯
the nature of the work (e.g., HVAC or structural • engineering). • Experience in mechanical engineering development standards and techniques including GD&T. • Experience with electro-mechanical components/systems, configurationmanagement, and CAD systems. For example, experience with Solid Edge/Solid Works, or equivalent, risk identification and mitigation,MATLAB, LabVIEW, T&E analysis, electronics packaging design, and More ❯
focused environment. Skills & experience required Deep knowledge of Salesforce (essential) Proven experience as a developer Experience with DevOps, GIT, and CI/CD pipelines Infrastructure as Code experience Strong configurationmanagement skills in complex environments Salesforce certification (advantageous) This role will see you in the Cardiff office 1-2 days per week so applicants must live in a More ❯